The way we engage on online has changed dramatically: we now use the internet to access information, to communicate, to work, to make purchases, to mobilise, to connect with our loved ones, and to access public services, amongst many others.The use of social media intelligence can offer a disturbing level of insight into a social media user’s life: our digital data trails and the content we share are being used by companies and governments to make predictions about our views, our beliefs, and our behaviour. We will discuss case studies on how to document and expose the harm caused by these practices. We will also present how to call companies to be transparent about their business models and demanding that unnecessary structural features that enable the generation and processing of data, potentially exposing them to unauthorised third parties, be reviewed and amended. Finally as part of the hands-on workshop we will discuss our new information security procedures (building on our research and policy work on harms we’ve observed ) and educational materials that we are producing for users regarding setting, tracking etc.
JerusalemThe way we engage on online has changed dramatically: we now use the internet to access information, to communicate, to work, to make purchases, to mobilise, to connect with our loved ones, and to access public services, amongst many others.The use of social media intelligence can offer a disturbing level of insight into a social media user’s life: our digital data trails and the content we share are being used by companies and governments to make predictions about our views, our beliefs, and our behaviour. We will discuss case studies on how to document and expose the harm caused by these practices. We will also present how to call companies to be transparent about their business models and demanding that unnecessary structural features that enable the generation and processing of data, potentially exposing them to unauthorised third parties, be reviewed and amended. Finally as part of the hands-on workshop we will discuss our new information security procedures (building on our research and policy work on harms we’ve observed ) and educational materials that we are producing for users regarding setting, tracking etc.